background image

 

12 

 

13.  If Embedded Fax is enabled and then subsequently disabled before there is a power failure or system crash 

and Embedded Fax is then re-enabled after the device is restored to operational mode, the first ODIO that is 
subsequently initiated may fail. If that situation occurs, reinitiate the ODIO.  

Note: When an ODIO fails under this scenario no Fax ODIO report may be printed, the WebUI may indicate 
that  the  ODIO  was  successful,  the  Confirmation  Report  may  indicate  that  the  ODIO  was  ‘Not  Completed’ 
because the device lost power and the Audit Log may indicate that the 

ODIO was ‘Cancelled’. 

14.  If there is a failure in the hard disk drive(s)

 

a message recommending that an On Demand Image Overwrite be 

run will appear on the Control Panel screen. An Immediate Image Overwrite Error Sheet will also be printed or 
may contain incomplete status information. Immediately perform the requested On Demand Image Overwrite.  

15.  The time shown on the On Demand Overwrite progress screen displayed on the Control Panel may not reflect 

Daylight Savings Time. The message shown on the On Demand Overwrite progress screen displayed on the 
Control Panel may be slightly different for different products, reflecting the expected time the ODIO will take to 
complete for that product. 

16.  If an ODIO is successfully completed, the completion (finish) time shown on the printed On Demand Overwrite 

Confirmation Report will be the time that the system shuts down. 

17.  Perform a Full ODIO immediately before the device is decommissioned, returned, sold or disposed of. 

e.  The  device  supports  the  use  of  SSLv2.0,  SSLv3.0,  RC4  and  MD5.  However,  customers  are  advised  to  set  the 

crypto policy of their clients to request either TLSv1.x (SSLv3 should be disabled) and to disallow the use of RC4 
and MD5. The cryptographic module supports additional ciphers that may be called by other unevaluated functions. 

Using the device in FIPS mode will automatically restrict the device to using TLSv1.x only. 

f. 

When utilizing SSL for secure scanning: 

  SSL should be enabled and used for secure transmission of scan jobs. 

  When storing scanned images to a remote repository using an https: connection, a Trusted Certificate Authority 

certificate  should  be  uploaded  to  the  device  so  the  device  can  verify  the  certificate  provided  by  the  remote 
repository. 

  When an SSL certificate for a remote SSL repository fails its validation checks, the associated scan job will be 

deleted and not transferred to the remote SSL repository. In this case the job status reported in the Completed 
Job Log for this job will read: “Job could not be sent as a connection to the server could not be established”. 

  The HTTPS protocol should be used to send scan jobs to a remote IT product.  

g.  Audit Log Notes: 

 

Some text in the Audit Log may contain strings that are not written in US-ASCII. 

 

In viewing the Audit Log the System Administrator should note the following: 

  User names in Audit Log entries can sometimes include extraneous characters. 

  Deletion of a file from Reprint Saved Job folders or deletion of a Reprint Saved Job folder itself is recorded 

in the Audit Log.  

  Deletion of a print or scan job or deletion of a scan-to-mailbox job from its scan-to-mailbox folder may not 

be recorded in the Audit Log.   

  Deletion of a held job may display an incorrect status in the corresponding entry in the Audit Log. 

  Extraneous process termination events (Event 50) may be recorded in the Audit Log when the device is 

rebooted  or  upon  a  Power  Down  /  Power  Up.  Extraneous  security  certificate  completion  status 
(Created/Uploaded/Downloaded) events (Event 38) may also be recorded. 

  Extraneous  events  may  be  recorded  in  the  Audit  Log  when  McAfee

®

  Embedded  Control  is  enabled  or 

disabled, when FIPS 140-2 mode is enabled or when a user permission role is defined. 

  Duplicate audit log entries may appear in the Audit Log for some events such as when the system timeout 

values are changed or when adding/deleting a Domain Controller for smart card authentication. 

  Download  and  review  the  Audit  Log  on  a  daily  basis.  In  downloading  the  Audit  Log,  the  System 

Administrator  should  ensure  that  Audit  Log  records  are  protected  after  they  have  been  exported  to  an 
external trusted IT product and that the exported records are only accessible by authorized individuals.  

 

If a system interruption such as power loss occurs, a job in process may not be fully written to the hard disk 
drive(s). In that case, any temporary data created will be overwritten during job recovery but a corresponding 
record for the job may not be recorded in the completed job log or audit log. 

Содержание WorkCentre 3655

Страница 1: ...ntre 5845 5855 5865 5865i 5875 5875i 5890 5890i WorkCentre 5945 5945i 5955 5955i WorkCentre 6655 6655i WorkCentre 7220 7220i 7225 7225i WorkCentre 7830 7830i 7835 7835i 7845 7845i 7855 7855i WorkCentr...

Страница 2: ...from the Common Criteria Certified Product website http www commoncriteriaportal org products html list of evaluated products from the Xerox security website http www xerox com information security c...

Страница 3: ...Accessing Administration and Configuration Settings in Section 2 of the applicable System Administration Guide SAG 5 To log in to the Local User Interface denoted hereafter in this document as the Con...

Страница 4: ...ructions in Section 4 of the SAG Set up unique user accounts with appropriate privileges on the device for all users who require access to the device by following the User Database instructions in Sec...

Страница 5: ...ed certificate is installed by default on the device If a CA certificate is desired a Certificate Signing Request CSR will have to be sent to a Certificate Authority to obtain the CA Certificate befor...

Страница 6: ...number for the Audit Log Server Enter the directory path to the filename where the transferred Audit Log is to be stored Enter the login name and password to access the Audit Log server Either schedu...

Страница 7: ...re print job only the submitter of a held print job can release the job and only the System Administrator can delete any print job 16 802 1x Device Authentication Enable and configure 802 1x device au...

Страница 8: ...ption and signing Workflow Scanning Scan to Mailbox Scan to USB Print from USB Print from Mailbox NTP SMB Filing When setting up the device to be in the evaluated configuration perform the following s...

Страница 9: ...Fax in Section 8 of the SAG Makes sure the Delete on Print option is selected for Received Documents The Local Polling option and embedded fax mailboxes should not be set up or used at any time Remot...

Страница 10: ...encryption and signing of Scan to Email jobs by following the instructions for Configuring Email Encryption Settings and Configuring Email Signing Settings respectively under Configuring Email Securit...

Страница 11: ...0 of the SAG II Secure Acceptance Secure acceptance once device delivery and installation is completed should be done by Printing out a Configuration Report from the Web UI by following the Printing t...

Страница 12: ...age will persist until an On Demand Image overwrite is initiated by the System Administrator In the case that the copy controller is reset at the same time a copy job is being processed by the device...

Страница 13: ...certificate should be uploaded to the device so the device can verify the certificate provided by the remote repository When an SSL certificate for a remote SSL repository fails its validation checks...

Страница 14: ...rvice calls for example through appropriate signage in order to discourage unauthorized physical attacks such as attempts to remove the internal hard disk drive s Ensure that office personnel are made...

Страница 15: ...vice Allows the user to pause an active copy print workflow scanning scan to email Internet Fax or Embedded Fax job while it is being processed Is accessible by selecting the Stop machine hard button...

Страница 16: ...Filter guess algorithm will use a strict or loose interpretation Is accessible by typing http IP Address diagnostics postScriptTokens php Web Services IP Lockout Reset Allows the System Administrator...

Страница 17: ...t be displayed for a device in the evaluated configuration Scan Image Compression Allows the System Administrator to manage the asymmetric sub sampling options of scan image processing Is accessible b...

Страница 18: ...m the Web User Interface with no user login and authentication required Site Map Provides the user with hyperlink pointers to each Web User Interface screen organized by Web UI tab Is accessible by se...

Страница 19: ...oss of business profits or special damages even if Xerox Corporation has been advised of the possibility of such damages Some states do not allow the exclusion or limitation of liability for consequen...

Отзывы:

Похожие инструкции для WorkCentre 3655